From e89f0ac5ae35d1877e00a5221d11df94df26b324 Mon Sep 17 00:00:00 2001 From: wchen-r7 Date: Fri, 3 Oct 2014 23:50:48 -0700 Subject: [PATCH] Updated How to write a browser exploit using BrowserExploitServer (markdown) --- ...-a-browser-exploit-using-BrowserExploitServer.md | 13 ++++++++----- 1 file changed, 8 insertions(+), 5 deletions(-) diff --git a/How-to-write-a-browser-exploit-using-BrowserExploitServer.md b/How-to-write-a-browser-exploit-using-BrowserExploitServer.md index 6d6619c634..ade6f2e93d 100644 --- a/How-to-write-a-browser-exploit-using-BrowserExploitServer.md +++ b/How-to-write-a-browser-exploit-using-BrowserExploitServer.md @@ -90,11 +90,14 @@ The exact values available for :os_flavor: | WindowsVersions::EIGHT | "8" | The exact values for :ua_name: -* HttpClients::IE = "MSIE" -* HttpClients::FF = "Firefox" -* HttpClients::SAFARI = "Safari" -* HttpClients::OPERA = "Opera" -* HttpClients::CHROME = "Chrome" + +| Constant | Value | +| -------- | ----- | +| HttpClients::IE | "MSIE" | +| HttpClients::FF | "Firefox" | +| HttpClients::SAFARI | "Safari" | +| HttpClients::OPERA | "Opera" | +| HttpClients::CHROME | "Chrome" | More of these constants can be found here: https://github.com/rapid7/metasploit-framework/blob/master/lib/msf/core/constants.rb